Taking the Challenge Out of Embracing Event Logging
There has been an increased focus among U.S. government agencies on adapting to modern IT environments and enhancing cybersecurity solutions. This increased focus on security government networks, data, and critical infrastructure is a result of ongoing digital transformation initiatives that are resulting in more mission-critical connected systems and more data for agencies to secure. It’s also a result of the increased number of cyberattacks and more sophisticated cyber-criminals that are targeting our nation’s networks.
How the Government Can Leverage Artificial Intelligence and Machine Learning on Azure
- Read more about How the Government Can Leverage Artificial Intelligence and Machine Learning on Azure
What is the difference between AI and ML?
Artificial Intelligence and Machine Learning are two of the most transformative technologies in the computing space that are changing the world in which we live. However, there is often confusion in in what constitutes Artificial Intelligence, and what constitutes Machine Learning.
Modernize Microsoft Workloads with AWS
If I asked you which cloud provider had the most experience running Microsoft applications, would you know the answer? You might be surprised. Customers have been running Microsoft Workloads on AWS since 2008 – two years before Microsoft Azure became commercially available. We work in an industry that can sometimes become clouded with competitive statements that can confuse customers and introduce doubt into the decision-making process, but the facts are clear: Windows is truly a first-class citizen on AWS.
Maximize the Performance of Your Microsoft Ecosystem
A vast majority of government networks are driven by Microsoft products, from Office 365 to the Azure cloud platform. It should come as no surprise, then, that more and more agencies are looking for tools to monitor Microsoft systems more effectively—all through a single pane of glass.
The good news is there are ways to make the most of existing Microsoft technology with complementary monitoring strategies that will meet the needs of the federal IT operations security teams, SysAdmins, DevOps pros, and managers.
Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack
- Read more about Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack
Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.
What You Need To Know About The WannaCry Ransomware Virus
On May 12 a ransomware virus, WannaCry, was released on the Internet and rapidly spread to hundreds of thousands of Microsoft Windows based computers in over 150 countries. The malware encrypts critical files on a computer, such as Excel, Word, and other important files, and seeks out backup copies for encryption as well. Once it infects a system, it requires the victim to pay approximately $300 in digital currency (Bitcoin), and immediately tries to find other systems to infect.